| // Licensed to the Apache Software Foundation (ASF) under one |
| // or more contributor license agreements. See the NOTICE file |
| // distributed with this work for additional information |
| // regarding copyright ownership. The ASF licenses this file |
| // to you under the Apache License, Version 2.0 (the |
| // "License"); you may not use this file except in compliance |
| // with the License. You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, |
| // software distributed under the License is distributed on an |
| // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| // KIND, either express or implied. See the License for the |
| // specific language governing permissions and limitations |
| // under the License. |
| |
| use std::fmt::Debug; |
| use std::sync::Arc; |
| |
| use http::Request; |
| use http::Response; |
| use http::StatusCode; |
| use log::debug; |
| use mea::rwlock::RwLock; |
| |
| use super::B2_SCHEME; |
| use super::config::B2Config; |
| use super::core::B2Core; |
| use super::core::B2Signer; |
| use super::core::constants; |
| use super::core::parse_file_info; |
| use super::deleter::B2Deleter; |
| use super::error::parse_error; |
| use super::lister::B2Lister; |
| use super::writer::B2Writer; |
| use super::writer::B2Writers; |
| use opendal_core::raw::*; |
| use opendal_core::*; |
| |
| /// [b2](https://www.backblaze.com/cloud-storage) services support. |
| #[doc = include_str!("docs.md")] |
| #[derive(Default)] |
| pub struct B2Builder { |
| pub(super) config: B2Config, |
| } |
| |
| impl Debug for B2Builder { |
| fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { |
| f.debug_struct("B2Builder") |
| .field("config", &self.config) |
| .finish_non_exhaustive() |
| } |
| } |
| |
| impl B2Builder { |
| /// Set root of this backend. |
| /// |
| /// All operations will happen under this root. |
| pub fn root(mut self, root: &str) -> Self { |
| self.config.root = if root.is_empty() { |
| None |
| } else { |
| Some(root.to_string()) |
| }; |
| |
| self |
| } |
| |
| /// application_key_id of this backend. |
| pub fn application_key_id(mut self, application_key_id: &str) -> Self { |
| self.config.application_key_id = if application_key_id.is_empty() { |
| None |
| } else { |
| Some(application_key_id.to_string()) |
| }; |
| |
| self |
| } |
| |
| /// application_key of this backend. |
| pub fn application_key(mut self, application_key: &str) -> Self { |
| self.config.application_key = if application_key.is_empty() { |
| None |
| } else { |
| Some(application_key.to_string()) |
| }; |
| |
| self |
| } |
| |
| /// Set bucket name of this backend. |
| /// You can find it in <https://secure.backblaze.com/b2_buckets.html> |
| pub fn bucket(mut self, bucket: &str) -> Self { |
| self.config.bucket = bucket.to_string(); |
| |
| self |
| } |
| |
| /// Set bucket id of this backend. |
| /// You can find it in <https://secure.backblaze.com/b2_buckets.html> |
| pub fn bucket_id(mut self, bucket_id: &str) -> Self { |
| self.config.bucket_id = bucket_id.to_string(); |
| |
| self |
| } |
| } |
| |
| impl Builder for B2Builder { |
| type Config = B2Config; |
| |
| /// Builds the backend and returns the result of B2Backend. |
| fn build(self) -> Result<impl Access> { |
| debug!("backend build started: {:?}", &self); |
| |
| let root = normalize_root(&self.config.root.clone().unwrap_or_default()); |
| debug!("backend use root {}", &root); |
| |
| // Handle bucket. |
| if self.config.bucket.is_empty() { |
| return Err(Error::new(ErrorKind::ConfigInvalid, "bucket is empty") |
| .with_operation("Builder::build") |
| .with_context("service", B2_SCHEME)); |
| } |
| |
| debug!("backend use bucket {}", &self.config.bucket); |
| |
| // Handle bucket_id. |
| if self.config.bucket_id.is_empty() { |
| return Err(Error::new(ErrorKind::ConfigInvalid, "bucket_id is empty") |
| .with_operation("Builder::build") |
| .with_context("service", B2_SCHEME)); |
| } |
| |
| debug!("backend bucket_id {}", &self.config.bucket_id); |
| |
| let application_key_id = match &self.config.application_key_id { |
| Some(application_key_id) => Ok(application_key_id.clone()), |
| None => Err( |
| Error::new(ErrorKind::ConfigInvalid, "application_key_id is empty") |
| .with_operation("Builder::build") |
| .with_context("service", B2_SCHEME), |
| ), |
| }?; |
| |
| let application_key = match &self.config.application_key { |
| Some(key_id) => Ok(key_id.clone()), |
| None => Err( |
| Error::new(ErrorKind::ConfigInvalid, "application_key is empty") |
| .with_operation("Builder::build") |
| .with_context("service", B2_SCHEME), |
| ), |
| }?; |
| |
| let signer = B2Signer { |
| application_key_id, |
| application_key, |
| ..Default::default() |
| }; |
| |
| Ok(B2Backend { |
| core: Arc::new(B2Core { |
| info: { |
| let am = AccessorInfo::default(); |
| am.set_scheme(B2_SCHEME) |
| .set_root(&root) |
| .set_native_capability(Capability { |
| stat: true, |
| |
| read: true, |
| |
| write: true, |
| write_can_empty: true, |
| write_can_multi: true, |
| write_with_content_type: true, |
| write_with_user_metadata: true, |
| // The min multipart size of b2 is 5 MiB. |
| // |
| // ref: <https://www.backblaze.com/docs/cloud-storage-large-files> |
| write_multi_min_size: Some(5 * 1024 * 1024), |
| // The max multipart size of b2 is 5 Gb. |
| // |
| // ref: <https://www.backblaze.com/docs/cloud-storage-large-files> |
| write_multi_max_size: if cfg!(target_pointer_width = "64") { |
| Some(5 * 1024 * 1024 * 1024) |
| } else { |
| Some(usize::MAX) |
| }, |
| |
| delete: true, |
| copy: true, |
| |
| list: true, |
| list_with_limit: true, |
| list_with_start_after: true, |
| list_with_recursive: true, |
| |
| presign: true, |
| presign_read: true, |
| presign_write: true, |
| presign_stat: true, |
| |
| shared: true, |
| |
| ..Default::default() |
| }); |
| |
| am.into() |
| }, |
| signer: Arc::new(RwLock::new(signer)), |
| root, |
| |
| bucket: self.config.bucket.clone(), |
| bucket_id: self.config.bucket_id.clone(), |
| }), |
| }) |
| } |
| } |
| |
| /// Backend for b2 services. |
| #[derive(Debug, Clone)] |
| pub struct B2Backend { |
| core: Arc<B2Core>, |
| } |
| |
| impl Access for B2Backend { |
| type Reader = HttpBody; |
| type Writer = B2Writers; |
| type Lister = oio::PageLister<B2Lister>; |
| type Deleter = oio::OneShotDeleter<B2Deleter>; |
| |
| fn info(&self) -> Arc<AccessorInfo> { |
| self.core.info.clone() |
| } |
| |
| /// B2 have a get_file_info api required a file_id field, but field_id need call list api, list api also return file info |
| /// So we call list api to get file info |
| async fn stat(&self, path: &str, _args: OpStat) -> Result<RpStat> { |
| // Stat root always returns a DIR. |
| if path == "/" { |
| return Ok(RpStat::new(Metadata::new(EntryMode::DIR))); |
| } |
| |
| let delimiter = if path.ends_with('/') { Some("/") } else { None }; |
| |
| let file_info = self.core.get_file_info(path, delimiter).await?; |
| let meta = parse_file_info(&file_info); |
| Ok(RpStat::new(meta)) |
| } |
| |
| async fn read(&self, path: &str, args: OpRead) -> Result<(RpRead, Self::Reader)> { |
| let resp = self |
| .core |
| .download_file_by_name(path, args.range(), &args) |
| .await?; |
| |
| let status = resp.status(); |
| match status { |
| StatusCode::OK | StatusCode::PARTIAL_CONTENT => { |
| Ok((RpRead::default(), resp.into_body())) |
| } |
| _ => { |
| let (part, mut body) = resp.into_parts(); |
| let buf = body.to_buffer().await?; |
| Err(parse_error(Response::from_parts(part, buf))) |
| } |
| } |
| } |
| |
| async fn write(&self, path: &str, args: OpWrite) -> Result<(RpWrite, Self::Writer)> { |
| let concurrent = args.concurrent(); |
| let writer = B2Writer::new(self.core.clone(), path, args); |
| |
| let w = oio::MultipartWriter::new(self.core.info.clone(), writer, concurrent); |
| |
| Ok((RpWrite::default(), w)) |
| } |
| |
| async fn delete(&self) -> Result<(RpDelete, Self::Deleter)> { |
| Ok(( |
| RpDelete::default(), |
| oio::OneShotDeleter::new(B2Deleter::new(self.core.clone())), |
| )) |
| } |
| |
| async fn list(&self, path: &str, args: OpList) -> Result<(RpList, Self::Lister)> { |
| Ok(( |
| RpList::default(), |
| oio::PageLister::new(B2Lister::new( |
| self.core.clone(), |
| path, |
| args.recursive(), |
| args.limit(), |
| args.start_after(), |
| )), |
| )) |
| } |
| |
| async fn copy(&self, from: &str, to: &str, _args: OpCopy) -> Result<RpCopy> { |
| let file_info = self.core.get_file_info(from, None).await?; |
| |
| let source_file_id = file_info.file_id; |
| |
| let Some(source_file_id) = source_file_id else { |
| return Err(Error::new(ErrorKind::IsADirectory, "is a directory")); |
| }; |
| |
| let resp = self.core.copy_file(source_file_id, to).await?; |
| |
| let status = resp.status(); |
| |
| match status { |
| StatusCode::OK => Ok(RpCopy::default()), |
| _ => Err(parse_error(resp)), |
| } |
| } |
| |
| async fn presign(&self, path: &str, args: OpPresign) -> Result<RpPresign> { |
| match args.operation() { |
| PresignOperation::Stat(_) => { |
| let resp = self |
| .core |
| .get_download_authorization(path, args.expire()) |
| .await?; |
| let path = build_abs_path(&self.core.root, path); |
| |
| let auth_info = self.core.get_auth_info().await?; |
| |
| let url = format!( |
| "{}/file/{}/{}?Authorization={}", |
| auth_info.download_url, self.core.bucket, path, resp.authorization_token |
| ); |
| |
| let req = Request::get(url); |
| |
| let req = req.body(Buffer::new()).map_err(new_request_build_error)?; |
| |
| // We don't need this request anymore, consume |
| let (parts, _) = req.into_parts(); |
| |
| Ok(RpPresign::new(PresignedRequest::new( |
| parts.method, |
| parts.uri, |
| parts.headers, |
| ))) |
| } |
| PresignOperation::Read(_) => { |
| let resp = self |
| .core |
| .get_download_authorization(path, args.expire()) |
| .await?; |
| let path = build_abs_path(&self.core.root, path); |
| |
| let auth_info = self.core.get_auth_info().await?; |
| |
| let url = format!( |
| "{}/file/{}/{}?Authorization={}", |
| auth_info.download_url, self.core.bucket, path, resp.authorization_token |
| ); |
| |
| let req = Request::get(url); |
| |
| let req = req.body(Buffer::new()).map_err(new_request_build_error)?; |
| |
| // We don't need this request anymore, consume |
| let (parts, _) = req.into_parts(); |
| |
| Ok(RpPresign::new(PresignedRequest::new( |
| parts.method, |
| parts.uri, |
| parts.headers, |
| ))) |
| } |
| PresignOperation::Write(_) => { |
| let resp = self.core.get_upload_url().await?; |
| |
| let mut req = Request::post(&resp.upload_url); |
| |
| req = req.header(http::header::AUTHORIZATION, resp.authorization_token); |
| req = req.header("X-Bz-File-Name", build_abs_path(&self.core.root, path)); |
| req = req.header(http::header::CONTENT_TYPE, "b2/x-auto"); |
| req = req.header(constants::X_BZ_CONTENT_SHA1, "do_not_verify"); |
| |
| let req = req.body(Buffer::new()).map_err(new_request_build_error)?; |
| // We don't need this request anymore, consume it directly. |
| let (parts, _) = req.into_parts(); |
| |
| Ok(RpPresign::new(PresignedRequest::new( |
| parts.method, |
| parts.uri, |
| parts.headers, |
| ))) |
| } |
| PresignOperation::Delete(_) => Err(Error::new( |
| ErrorKind::Unsupported, |
| "operation is not supported", |
| )), |
| _ => Err(Error::new( |
| ErrorKind::Unsupported, |
| "operation is not supported", |
| )), |
| } |
| } |
| } |